Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    CSD-Topology Installation and Configuration Overview

    Install Juniper Networks CSD-Topology by downloading and installing the CSD-Topology RPM bundle.

    For the RPM bundle installation, we recommend that you install CentOS 6.6 or 6.7 with the minimal ISO. If you are using a different version of Linux, contact JTAC to determine whether your Linux version is supported.

    After you successfully install the CSD-Topology software on an x86 server, you must establish a connection between the CSD-Topology and the network by configuring Path Computation Element Protocol (PCEP) on each PE router to configure the router as a Path Computation Client (PCC). A PCC supports the configurations related to the Path Computation Element (PCE) and communicates with the CSD-Topology (PCE), which by default is configured to accept a PCEP connection from any source address. After you have established communication between the CSD-Topology and the PCCs, you can configure topology acquisition using BGP-LS. For BGP-LS topology acquisition, you must configure both the CSD-Topology and the PCC routers.

    Note:

    We recommend that you use BGP-LS instead of IGP adjacency for topology acquisition for the following reasons:

    • The OSPF and IS-IS databases have lifetime timers, which means that if the OSPF or IS-IS neighbor is down, the corresponding database is not removed immediately. CSD-Topology is, therefore, not able to determine whether the topology is valid.

    • Using BGP-LS minimizes the risk of making the JunosVM a transit router between AS areas if the GRE metric is not properly configured.

    • Typically, CSD-Topology is located in a Network Operations Center (NOC) Data Center, multihops away from the backbone and MPLS TE routers. This is easily accommodated by BGP-LS, but more difficult for IGP protocols because they would have to employ a tunneling mechanism such as GRE to establish adjacency.

    Modified: 2016-08-29